Loading…
Resource-efficient and secure distributed state estimation over wireless sensor networks: a survey
Wireless sensor networks (WSNs) are extensively adopted for remote monitoring and tracking scenarios, such as battlefield surveillance, target detection and tracking, traffic condition detection, power system monitoring and health monitoring, thanks to their promising benefits in terms of flexibilit...
Saved in:
Published in: | International journal of systems science 2021-12, Vol.52 (16), p.3368-3389 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Wireless sensor networks (WSNs) are extensively adopted for remote monitoring and tracking scenarios, such as battlefield surveillance, target detection and tracking, traffic condition detection, power system monitoring and health monitoring, thanks to their promising benefits in terms of flexibility, reliability and cost-effectiveness. However, some critical WSN applications, such as intelligent transportation and smart grid monitoring, have stringent requirements in terms of resource budget and security. This paper provides a survey of the trending resource-efficient and secure techniques currently used with distributed estimation algorithms over WSNs. Recent progresses on these two major research trends are reviewed, respectively, for WSN-based monitoring systems. More specifically, the first part of the survey covers the state-of-the-art in resource-efficient distributed state estimation. The main results along this line of research are classified into protocol-based scheduling, static event-triggered scheduling, dynamic event-triggered scheduling and stochastic event-triggered scheduling. Then, in the second part, the latest results on secure distributed state estimation are reviewed, where secure distributed state estimation under data integrity attacks and data available attacks, and distributed attack detection are examined, respectively. Finally, several challenging issues in the context of distributed state estimation are discussed for potential future research. |
---|---|
ISSN: | 0020-7721 1464-5319 |
DOI: | 10.1080/00207721.2021.1998843 |